• Title/Summary/Keyword: RFID Tag Group

Search Result 37, Processing Time 0.035 seconds

A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification

  • Jia, Xiaolin;Feng, Yuhao;Gu, Yajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1460-1478
    • /
    • 2020
  • This paper proposes a novel anti-collision protocol for large-scale RFID tags identification, named Bi-response Collision Tree Protocol (BCT). In BCT, two group of tags answer the reader's same query in two response-cycles respectively and independently according to the bi-response pattern. BCT improves the RFID tag identification performance significantly by decreasing the query cycles and the bits transmitted by the reader and tags during the identification. Computation and simulation results indicate that BCT improves the RFID tag identification performance effectively, e.g. the tag identification speed is improved more than 13.0%, 16.9%, and 22.9% compared to that of Collision Tree Protocol (CT), M-ary Collision Tree Protocol (MCT), and Dual Prefix Probe Scheme (DPPS) respectively when tags IDs are distributed uniformly.

High Speed Collision Avoidance Algorithm for Active RFID Network System (능동형 RFID 네트워크 시스템 고속 충돌방지 알고리즘)

  • Kim, Jae-Jeong;Lee, Hak-Jae;Kim, Yoeng-Min
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.581-590
    • /
    • 2016
  • This paper proposes an efficient collision avoidance algorithm that a group of RFID readers manage each of their affiliated active RFID tags in a space by establishing wireless network and avoids communication collision between RFID reader to reader and RFID tag to tag, and reader to tag. RF readers operate as wireless network nodes, create synchronous links each other, and can exchange messages. Active tags also are operated communicating each reader devices synchronously, and competing slot position between tags algorithm using unique tag identification number is implemented. Each reader node operates their own reader function different time slot network communication period to prevent collision between readers communication.

Adaptive Group Separation Anti-Collision Algorithm for Efficient RFID System (효율적인 RFID 시스템을 위한 Adaptive Group Separation 충돌방지 알고리듬)

  • Lee, Hyun-Soo;Lee, Suk-Hui;Bang, Sung-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.299-300
    • /
    • 2008
  • In this paper, we propose Adaptive Group Separation(AGS) algorithm for efficient RFID system. AGS algorithm determines the optimized initial prefix size m, and divides the group of ��$2^m$. A reader requests the group and searches the tag ID. If a tag collision occurred, reader adds a one bit, '0' or '1' at first bit of collision point. As a result, we observe that transmitted data bits and the recognition time are decreased.

  • PDF

Patient Classification Scheme for Patient Information Management in Hospital U-Healthcare System (병원 의료시설 내 U-Healthcare 환경에서 환자 정보 관리를 위한 환자 세분화 기법)

  • Lee, Ki-Jeong;Park, Sung-Won
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.131-137
    • /
    • 2010
  • UMSN (Ubiquitous Medical Sensor Network) is being used in u-Healthcare system of various medical facilities to identify objects and get information from sensors in real-time. RFID using radio frequency determines objects using Reader, which reads Tags attached to patients. However, there is a security vulnerability wherein Tag send its ID to illegal Reader because Tags always response to Readers request regarding of its Tag ID. In this paper, we propose Tag ID Classification Scheme to reduce Back-end Server traffic that caused by requests to authenticate between Readers and Tags that are attached to medical devices, patients, and sensors; To reduce security threats like eavesdropping and spoofing that sometimes occurred during authentication procedure. The proposed scheme specifies the patient category as a group based on patients Tag ID string. Only allowed Reader can perform authentication procedure with Back-end Server. As a result, we can reduce Back-end Server traffic and security threats.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

Modal Analysis of an Ultrasonic Tool Horn for RFID TAG Micro-pattern Forming (RFID TAG 미세패턴 성형을 위한 공구혼 진동해석)

  • Kim, Kang-Eun;Lee, Bong-Gu;Choi, Sung-Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.652-658
    • /
    • 2016
  • In this paper, the theoretical research and simulation using the Finite Element Method (FEM) to design and form a micro-pattern for an ultrasonic horn is described. The present method is based on an initial design estimate obtained by FEM analysis. The natural and resonant frequencies required for the ultrasonic tool horn used for forming the fine pattern were predicted by finite element analysis. FEM analysis using ANSYS S/W was used to predict the resonant frequency for the optimum technical design of the ultrasonic horn vibration mode shape. When electrical power is supplied to the ultrasonic transducer, it is converted into mechanical movement energy, leading to vibration. The RFID TAG becomes the pattern formed on the insulating sheet by using the longitudinal vibration energy of the ultrasonic tool horn. The FEM analysis result is then incorporated into the optimal design and manufacturing of the ultrasonic tool horn.

Comparison of Memoryless Anti-collision Protocols for Tag Identification (태그 인식을 위한 무기억 충돌 방지 프로토콜의 비교 분석)

  • Yang, Eui-Sik;Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.565-568
    • /
    • 2005
  • RFID system allows contactless identification of objects, where small tags are attached to objects and information of objects are transferred using radio frequency. In recent years, industries have incorporated several identification systems to its production processes, which allow collecting automatically information about goods. In order to communicate with a single tag out of a group of tags, the target tag has to be identified. Therefore the read has to attempt to obtain the unique identification code of each tag within its read range. This paper presents performance results of QT and QT-sl protocols, which are tag identification protocols incorporating memoryless property. The memoryless property is that the current response of each tag only depends on the current query of the reader but not on the past history of the reader's queries.

  • PDF

Adaptive Group Separation Anti-Collision Algorithm for Efficient RFID System (효율적인 RFID 시스템을 위한 Adaptive Group Separation 충돌방지 알고리듬)

  • Lee, Hyun-Soo;Lee, Suk-Hui;Kim, Sang-Ki;Bang, Sung-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.48-55
    • /
    • 2009
  • In this paper, We propose Adaptive Group Separation algorithm for efficient RFID system AGS algorithm determines the optimized initial prefix size j, and divides the group of. A reader requests the group and searches the tag ID. If a tag collision occurred, reader adds a one bit, '0' or '1' at first bit of collision point, As a result we observe that transmitted data bits and the recognition time are decreased. The proposed algorithms have been verified by computer simulation. The performance of the proposed anti-collision algorithm is evaluated in terms of the number of repetitions and the amount of transmission bits according to the in crease of the number of tags is 256. The AGS algorithm improve the number of repetitions by about 32.3% and reduce tile amount of the transmission bits by about 1/40 than slotted binary tree algorithm.

KKR code conversion for ALE middleware (ALE 미들웨어를 위한 KKR 코드 변환)

  • Byun, Ji-Woong;Byun, Yung-Cheol;Lee, Dong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1759-1766
    • /
    • 2008
  • RFID middleware is the system software that converts EPC data collected from RFID reader devices into meaningful data, that users want, and transfers the result to the users with a variety of protocols. ALE specification, the RFID middleware specification proposed by EPCglobal that is a leading group of do facto international standards with respect to RFID, can handle only EPC code. Meanwhile, a new code system which is called KKR was proposed by NIDA in order to represent RFID tag data in a specific manner and cultivate the domestic RFID industry. In this case, the existing RFID middleware can not process KKR code system because of inherent attributes of the system. In this paper, we proposed a method of KKR code conversion to properly process KKR code in ALE middieware, implemented our method in real, and adopted it into existing ALE middleware. Also, we proposed a new URN format for RFID tag data to manipulate KKR code in ALE middleware. By using the proposed method, the existing ALE middleware conforming to international specification can handle KKR code effectively, and the integration among RFID middleware and legacy systems can be easily supported also.